AdvancedPersistentThreatMalwareSSLDecryptRiskAssessmentFirewallRecoverPassPhaseSpearPhishingPhishingRespondProtectDetectLeastPrivilegePatchManagementAntivirusVPNTypesofHackersSecurePasswordAssetManagementTwo-FactorAuthenticationSecurityAwarenessTrainingSecureEmailDataDiscoveryIdentifyAdvancedPersistentThreatMalwareSSLDecryptRiskAssessmentFirewallRecoverPassPhaseSpearPhishingPhishingRespondProtectDetectLeastPrivilegePatchManagementAntivirusVPNTypesofHackersSecurePasswordAssetManagementTwo-FactorAuthenticationSecurityAwarenessTrainingSecureEmailDataDiscoveryIdentify

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Advanced Persistent Threat
  2. Malware
  3. SSL Decrypt
  4. Risk Assessment
  5. Firewall
  6. Recover
  7. PassPhase
  8. Spear Phishing
  9. Phishing
  10. Respond
  11. Protect
  12. Detect
  13. Least Privilege
  14. Patch Management
  15. Antivirus
  16. VPN
  17. Types of Hackers
  18. Secure Password
  19. Asset Management
  20. Two-Factor Authentication
  21. Security Awareness Training
  22. Secure Email
  23. Data Discovery
  24. Identify